Dark Web Monitoring Sample Clauses

Dark Web Monitoring. If your information has been affected by a data breach, it may end up on the dark web. The dark web is a place where personal information is bought and sold. If we detect or believe your information may be part of a breach or on the dark web, we will send you a notification. We will not remove your information from the dark web and we do not ensure the accuracy or integrity of the information on the dark web.
AutoNDA by SimpleDocs
Dark Web Monitoring. 3.7.13.1 Dark Web Monitoring is provided by 3rd Party Solution.
Dark Web Monitoring. Detect: Employees often use the same password for multiple services on the web, such as CRM, e- commerce sites, and social media. Proactive monitoring for stolen and compromised employee data on the dark web allows us to detect when a problem arises, before a major breach occurs. PHISH: We can send scheduled phishing campaigns, including customized messages to fit each group or department, at random times during a specified period. With an everchanging threat, it is important that your employees are exposed to all the latest phishing traps set by criminals.
Dark Web Monitoring. If we find your information on the dark web, we will send you a notification. We will not remove your information from the dark web and we do not ensure the accuracy or integrity of the information on the dark web.
Dark Web Monitoring. ADVANTAGE will configure dark web monitoring for one (1) domain name registered to the client and provide monitoring and notification services.
Dark Web Monitoring. Domains # Domains Cost per Domain TOTAL 1-5 Domains per month $350.00 $ 0.00 6 + Domains per month $300.00 $ 0.00 Emails # Emails Email Cost /Month Up to 50 Email Addresses $200.00 $ 0.00 51-100 Email Addresses $300.00 $ 0.00 Add Set Up Fees, if applicable

Related to Dark Web Monitoring

  • System Monitoring to ensure safe and continuous operation, the Customer must monitor key services and resource use as recommended by Deswik, and provide Deswik with details of monitoring and any relevant alerts as needed. Services to be monitors include, without limitation, disk space, CPU usage, memory usage, database connectivity, and network utilization.

  • Service Monitoring Customer gives express consent for Vodafone to monitor Customer’s use of the Service (and disclose and otherwise use the information obtained) only to: (a) the extent allowed by Applicable Law; (b) comply with Applicable Law; (c) protect the Network from misuse; (d) protect the integrity of the public internet and/or Vodafone’s systems and Networks; (e) the extent necessary to determine if Customer has breached any conditions or restrictions on use of the Service; (f) provide the Service; and/or (g) take other actions agreed or requested by Customer.

  • Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.

  • Supply Chain Monitoring A copy of the supply chain monitoring process, which should include details of the process for monitoring the financial viability of the supply chain (including timing), together with any known risks to supply chain stability and material changes to the supply chain. This should include extracts from Board level meetings, risk registers etc where any of the above items have been discussed. Annex 1 1 Information from Contractors who are not required to submit form AR01 to Companies House

  • Contract Monitoring The criminal background checks required by this rule shall be national in scope, and must be conducted at least once every three (3) years. Contractor shall make the criminal background checks required by Paragraph IV.G.1 available for inspection and copying by DRS personnel upon request of DRS.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Project Monitoring The Developer shall provide regular status reports to the NYISO in accordance with the monitoring requirements set forth in the Development Schedule, the Public Policy Transmission Planning Process Manual and Attachment Y of the OATT.

  • Account Monitoring Merchant acknowledges that Servicer will monitor Merchant’s daily deposit activity. Servicer may upon reasonable grounds suspend disbursement of Merchant's funds for any reasonable period of time required to investigate suspicious or unusual deposit activity. Servicer will make good faith efforts to notify Merchant promptly following suspension. Servicer is not liable to Merchant for any loss, either direct or indirect, which Merchant may attribute to any suspension of funds disbursement.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Hosting 46.7.4.1 At CLEC’s request, SBC-SWBT and SBC-AMERITECH shall perform hosting responsibilities for the provision of billable message data and/or access usage data received from CLEC for distribution to the appropriate billing and/or processing location or for delivery to CLEC of such data via SBC-SWBT’s and SBC-AMERITECH’s internal network or the nationwide CMDS network pursuant to the applicable Appendix HOST, which is/are attached hereto and incorporated herein by reference.

Time is Money Join Law Insider Premium to draft better contracts faster.